Research Article

A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey

Table 3

Security comparison of security-driven CH election schemes.

Category of security-driven CH election schemesUnpredictabilityNon-manipulabilityAgreement propertyImmunity against message lossPrivacy

Pre-distributed key schemesF-LEACHLowHighLowLowLow
SecLEACHLowHighLowLowLow

Random number schemesCommitment-based schemeLowLowMediumLowLow
Seed-based schemeLowLowMediumLowLow
Merkle’s puzzle based schemeMediumHighHighMediumLow
Trust-based schemeLowHighHighHighLow

Key chain schemesDong’s schemeLowLowMediumMediumLow
Han’s schemeLowLowLowMediumLow

Cryptographic schemesSymmetric cryptography schemeLowHighLowLowLow
Discrete logarithm schemeHighHighLowLowHigh